Which Antivirus Vendors Are Supported

The SecPoint Protector Unified Threat Management and Next Generation Firewall UTM Appliance showcases compatibility (and can integrate itself) with three different antivirus solutions. To be more specific, it supports Open Source Clam AV, BitDefender, and Kaspersky. SecPoint's bread-and-butter UTM can offer firewall-based preventive maintenance while also working smoothly with third-party antivirus scanning at the same time, thus serving as the prevention and cure for any and all viral computer infections from a wide variety of threats. You can easily enable or disable the vendors like you want as well as make them run all at the same time to ensure that your computer or network system is 100% protected from online malware threats.

Thanks to the combined forces of SecPoint UTM

Firewall Appliance as well as any or all of the three aforementioned vendors (and their respective antivirus solutions), you can protect your machine or servers from exploits, vulnerabilities, spyware, adware, botnets, Trojans, worms, browser hijackers, and (of course) viruses. To activate and link up a commercial antivirus vendor product with the Protector, you'll need to activate your license. You can choose to run with one antivirus solution at a time or run with all three approved antivirus applications for maximum defense and machine safety. Without proper protection, your system maybe hacked and its valuable data maybe destroyed and lost.

To minimize these risks, you're required to install an antivirus package on your PC, specifically ones that can work along with the Protector so that its UTM capabilities can be further bolstered with the dependable offerings of Open Source Clam AV, BitDefender, or Kaspersky. Although antivirus programs that aren't compatible with Protector could still run side-by-side with the appliance, such apps lack the integrated malware solutions that approved software can offer. The above mentioned AV software are dependable when it comes to inhibiting and mitigating the spread of malicious software while also ensuring that it won't get in the way of the Protector and its UTM responsibilities.